[1]周健[][],孙丽艳[]. 电子虚拟空间的信息犯罪分层研究[J].计算机技术与发展,2017,27(08):125-129.
 ZHOU Jian[][],SUN Li-yan[]. Investigation on Stratification of Information Crime in Electronic Virtual Environment[J].,2017,27(08):125-129.
点击复制

 电子虚拟空间的信息犯罪分层研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年08期
页码:
125-129
栏目:
安全与防范
出版日期:
2017-08-10

文章信息/Info

Title:
 Investigation on Stratification of Information Crime in Electronic Virtual Environment
文章编号:
1673-629X(2017)08-0125-05
作者:
 周健[1][2] 孙丽艳[2]
 1.安徽财经大学 管理科学与工程学院;2.北京邮电大学 计算机学院
Author(s):
 ZHOU Jian[1][2] SUN Li-yan[2]
关键词:
 信息犯罪信息犯罪层次电子证据电子虚拟环境
Keywords:
 information crimeinformation crime levelelectronic proofelectronic virtual environment
分类号:
TP309
文献标志码:
A
摘要:
 具有非暴力、强隐蔽性和跨时空特点的信息犯罪难于跟踪取证,容易造成信息犯罪的蔓延和不可控性.针对电子虚拟环境中的信息犯罪取证问题,在分析虚拟环境电子证据的内容和表现形式的基础上,提出了基于虚拟环境的犯罪行为层次和特点的电子证据数据链.该数据链将犯罪行为所经过的物理层、网络层、操作系统层、应用层和表示层作为现实虚拟链、物理技术链、数据链和软件工具链,将犯罪证据在每个层次的遗留痕迹形成一个完整逻辑的犯罪证据链.电子证据数据链不仅能够为信息犯罪提供更为完整的证据,有效提高了强隐蔽性和跨时空虚拟环境中犯罪证据的可追溯性,而且加强了犯罪数据保护,可为在虚拟和现实空间的犯罪证据提供连接桥梁,为在分层的虚拟空间中犯罪行为的研究提供新方法.
Abstract:
 Information crime has characteristics including non-violence,high covert and across space and time so that the evidence is difficult to acquire and track due to the uncontrollable spread in information crime.To deal with the question of achieving information crime proof in electronic virtual environment,on the basis of analyzing the content and form of information crime proof in electronic virtual environment,the chain of electronic proof based on layer and characters of crime in virtual environment has been presented.Furthermore the virtual chain,physical technology chain,data link and software tool chain have been formed when the crime behavior happens in the physical layer,network layer,operating system layer,application layer and presentation layer.The chain of electronic proof in the electronic virtual environment layer has been constructed,which not only provides the more comprehensive proof for information crime to improve the traceability of evidence in strong concealment and train-time-space electronic virtual environment,but also strengthens the protection of data on information crime,and the traces of crime have been left behind in every level for the emerging of complete criminal evidence.Therefore the chain has built the bridge between the virtual and the reality on information crime.Investigations on electronic virtual environment layer have provided new method for studies on information crime.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(08):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(08):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(08):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(08):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(08):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(08):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(08):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(08):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(08):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(08):47.

更新日期/Last Update: 2017-09-21